Thanks, the Sri, today. thanks, joining everyone, call for and
to post results, metrics. across guidance all pleased outperforming We quarter third our strong very are
breadth customers. that of to This even identity, controls is our continue secure right with level platform human resonating our consolidate Our with Security key and customers spend our driving motivator privileged relationships with turn which for is machine ability growth. the the Identity demonstrate to CyberArk, create every of in is ARR full strategic results a to to more across
highlights year-over-year. growing Net a ARR across million, ARR a quarter. XX% Subscription growing record was financial XX% $XX few record of strong Total variable. from we year-over-year. million. guidance million, was $XXX total metrics new fourth growing $XXX $XXX.X ARR was A our outperformed We outside million, subscription our seasonally XX% of delivered year-over-year. And quarter. the every revenue That's
income operating of X% That's million margin highlighting $XX.X year quarter. at or million the XX% cash period, for we the And as a in the report the are free transition. cash leverage subscription come pleased margin. out $XX.X model to we Non-GAAP our free came flow XX% up margin in a or operating business in ago from in flow
both Our an world results the Identities, longer are no mission-critical that solutions the attack, merely vectors attacks predominant first, are identity-related driven of today's in machines traditional sufficient. human more a organizations solutions. cyber customers where our by than victims of factors: X nature the XX% of In recognize of main enough. is managing point is and in and identities not identities commoditized on securing are siloed way threat
on to our secure power cycle the help of with can offer developers IT, all the automate identities machines. and discover acquisition strengthened workforce vision with to this life privileged platform we on October, enterprises the Second, further ability our that and the of to integrated We only across controls X. the closing deliver Venafi platform, from intelligent context, of with
delivering a means our digital can move measurable full businesses our by To in forward take us, risk of customers working to reduction execution. of program. execution fear and strength their hand-in-hand the ensure advantage with third, world every without And
on execution. platform in and our is Our the excellence foundation customers transformative relentless of solutions focus realize our from value ensuring
from consolidation to the We are market of benefiting shift trust.
can quarter, we build health and platform example, to you full momentum we by in company to As see care consolidate a continue in third one In our driven the the deals. In see one selling MFA, identities are Everywhere, desire by a success having will leading machine users, customer was across protecting human They platform. the of from endpoints PAM, and machine workforce replaced Secrets with Vendor identities CyberArk Endpoint capabilities the X solutions. get-go. and with Privilege vendor. CyberArk's SSO, This competing landed Secret leverage and across our management, IT
with deal closed QX. a of end Independently, customer this Venafi at the also
them the we closed synergies the can company. are a team combined a achieve strong is deal this While confident of with top as line we Venafi on own, their indication
look way IT, to database administrators. solution. their securing cloud customers are programs their shadow and they IT broad IT solution modernize protect a unique to expanding IT, approach with provides enterprise including set of PAM As users, administrators, to This our a
much standing use They to be the user's modern for are needs rotation of traditional combining privileged Enterprises a accounts, a approach need of security programs secure workloads time session This databases, While access marriage need and to and for services. productivity. layers done PAM remains. faster with and foundational value. are adoption just-in-time of for looking PAM as Today's and workflow, without and so more. a to cloud cases healthy management shared the X passive inhibiting vaulting security quicker
of standard is seat. helping fully win added What nearly and from our and comprehensive is Integrated deliver quarter. we logos, setting through new all delivered core to XXX third our into makes CyberArk solution one modern CyberArk powerful? AI platform and the and capabilities in detection threat This with by powered new the truly built-in The single enabled these We industry. program in the PAM response. IT
protect with our more driving more it's customers they cases. users addition, In across use as expansion existing
of for Gartner Our Magic Privileged analysts XXXX in once by positioned in Hyatt in furthest leader also the market were Overall Quadrant all to completeness industry Access Privileged of recognized Leadership the a X as the innovation and and sixth vision. leader categories were again quarter. in scoring pleased position and We Leader XXXX for an the KuppingerCole, Management, was leadership. in recognized Access leadership product time by as the innovation named Compass on be consecutive We Management
IT access always privileged developer. The access, environments the Modern just goes privilege X key cloud concept of left cloud to By identities cycles solution and needing is this increase workflows of securing without developers though PAM for expand dramatically and offers automated developer controls, to surface. Access beyond offering risk the users. the the securing X game attack unattended most high-risk and is changer and in securing standing life PAM privilege, behavior our access change. a group securing for modern with on the with Secure native enterprise, human Often identity infrastructure and Cloud the CyberArk a standing best population
the an teams the has security for enabler a to and to not CyberArk is is customer a with closely of bank, us organizations. More importantly, In solution, many It over with innovation. machine third worked quarter, and IT long-time extended IT the impediment our an access innovation within is years. protect leading European who privileged
deal. buying tackle customer expand our We to high-risk the ACV were this group to a see X-figure Now identity into Enterprise new population. decided Solution in excited developer the
misconfigured can risky team posture. privilege it platform and strategic the with developers best-in-class security speed multi-cloud approach, thrilled and security their risk security cloud identity all access with on privilege our customers impacting over of reduce standing is development. capabilities as control measurably and the we security a We the as cloud always enhance visibility of Wiz's with Wiz, help untamed access, to have to sport. cloud without approach where over security developer privileged they world critical unauthorized and announce unifying of and access, CyberArk's In of platform were tackle cloud entitlements, our partnership the scale X often Wiz's over
benefit and it cloud excited of Our gaining access have and about can control partnership environments customers their this in are points. immediate developer the
sit Moving from enough considered on where employee tool workday, with quarter. the one Solutions, our to privilege moment of their needs point. they crossed the $XXX every transforming another throughout million at identity securing end where the quarter MFA which controls from down the We level right is SSO ARR and of an were their workforce. Workforce efficiency in Workforce threshold this to had strong
As identities. a and of cohort only CIOs not that workforce growing across a CISOs result, and their understand substantial is but both all there prioritize security-first
users privilege lease implement SSO passwords with to everyday solutions devices, ability secure the CyberArk of the with browsing and managed the protect workforce and the streamline and security workforce more substantiate on controls even integrate Our Vault. unmanaged intelligent secure experience, privileged
de facto spear a with was SaaS X-figure spots reimagines environment great the landing into against entire enterprise the our company is substantial ransomware, multiple evidenced workflow, way enable a of the solutions landed showcase This Our the as our secure seamlessly the and deal, workforce of the authenticating tip a their by a leading passwordless workforce. who solution platform. protection and of
Before on strong Venafi I to vision, for another Identity of to our and Security very I year Machine highlight Management. just Secrets wanted move growth
time The resonating I We SaaS Secrets the of with Secrets with Management ACV and scale a enterprise the a recognize Secrets their quarter, and share deal they means position. want leading Identities deal better the U.S. X-figure of have is a and with Secrets value Cloud to competitive this who Conjur Conjur energy value a of Cloud Expanding for in never users more and way. of the been Hub. mid is protecting Machines Machine company tackling at first and combination CyberArk. are and with leading Secrets Hub IT
to more to was and X. the of forces identity landscape and a with team and welcome Venafi our Venafi the security. value the belief onset was culture. opportunity We customers the past close of take tremendous clear partners will tremendous reinforced than feedback technology this further to vision, our that was only thrilled convergence months will formally want acquisition have confidence The it the discussions October our that on of just our a from rose of platform. fit. From to strategic bring to machine reshape The CyberArk. Venafi, are this It powerful acquisition I Venafi joining
landscape Machine Security of we are I sheer solve volume, volume. and the Vs; the velocity. Identity Starting with exploding. industry, The whether devices they to workloads X number problems use machines, the variety is explaining or as an often have In and
a increasing XX constantly We is world ratio native AI obsolete. have human This in accelerating soon reliance that identity every only identities agents. IoT talked be its on devices the workloads, applications of and ratio will cloud and about for machine
volume, of machines machine automated types to the this world I to refers rapidly critical new manage the complexity certificates mentioned, From large just to to the adding various secure. forms variety not Variety a identity. but and of is seen growing to keys discover, types, level to the not also of variety. life With in a identity the On to there's secrets cycle tokens, identity. on keeping a secure of ability side with an human variety
away complexity landscape reduce solution. machine Customers across this machine clear need anymore. Organizations the or Managing solution to integrated identity bring and diverse an in enterprise-grade processes types. get bear with manual tools and an siloed cannot simplify, urgent have requires to a and complexity of
the lifespan, the and machines these are also no all of a And constantly themselves with they in of changing devices exploded. velocity and these When sudden, for together management finally, put only the They are applications. static and brief the time like exist has velocity, identities pace then disappear. period longer and shorter of of of and issuance femoral cases, identities you a workloads, some change of
compromise, The with risk By combination help a these and all operational provide with identities offerings centralized efficiency. and will Management prevent Machine will enhancing of Venafi protect and to Management ultimately organizations machine types. manage solution automating securing and CyberArk Identity Secrets reducing misuse identity offerings
want months. Venafi acquisition to top the closed, the over our priorities With I highlight coming
who First, world X,XXX around the to go-to-market customers yet. unleash into than we customers our Venafi are not more organization will tap the CyberArk
go will our on to And and certified the Management capabilities Venafi they ground billion identity rapidly the capabilities machine our we ecosystem both as hit a Second, get and third, market. with to running ready into addressable integrate $XX them after solution. partner Secrets we streamlined Venafi work will
how you Identity In how resonating a takeaways. with to and we for following is I customers. see present this and leave wants is CISOs the and aligned with buy, clear solution customer to need our selling the further want summary, Security has
we're level right the CyberArk And and identity execution level. take controls expanding platform, finally, and phase in every and our new moat deliver standard position human security. setting strong positioned machine, to is with to privileged a identity competitive vision well profitable growth leadership end-to-end machine stellar Venafi, our With a of deliver Our identity, and of we to durable security. next unique the are next to for
to it the part CFO be in seen Josh CFO I'm sure his we Before down you've year-end see January, stepping I this the Josh, succession. role will a over morning. will announced transition turn from planned call the and as of through
We agreed years. a has at moment are XX countless for ensure grateful contributions role on I adviser more smooth transition. to through a to to an to Josh's he take CyberArk to stay than acknowledge XXXX want
an and is the time at transition to and deliver. turned In scale a CyberArk, our $XX guided into revenue finance Josh model enabling in from you IPO us finance joined, the amazing multiplier, he seen XXXX, when subscription he have leader. than his less perpetual the through million organization from a results in force
and growth I contributions the been company scaled profitability. are measurable. true the stayed my his and of has since partner He have to We company, our strong joined values trusted delivering and
announce on new a finance CFO be January XXXX. Smith to I'm closely been and couldn't though core I our the our subscription worked delighted suited CFO. next think also better our transition of Board X, our has and to has be strategy. member with trusted long-term partner the to leadership will is leadership of team and a that executive our me She effective team, Erica anyone Erica and
role. So Erica, new your congratulations on
I to over With Josh. want it that, hand to